Skip to content

Commit 3ab8c99

Browse files
authored
Merge branch 'main' into main
2 parents 4a37b00 + 89662b2 commit 3ab8c99

File tree

5 files changed

+10
-10
lines changed

5 files changed

+10
-10
lines changed

defender-endpoint/linux-whatsnew.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,6 @@ What's new
9292
- The `mdatp threat quarantine add` command now requires superuser (root) privileges.
9393
- Custom definition path can now be updated without stopping Defender for Endpoint. Previously, this required stopping the service, but with this release onwards, updates to the definition path can be made dynamically, improving operational efficiency and reducing downtime.
9494
- Running Defender for Endpoint on Linux alongside Fapolicyd is now supported on RHEL and Fedora-based distributions, enabling both antivirus (real-time protection) and EDR functionality to operate without conflict. For other fanotify-based tools, MDE can still be used safely by setting the antivirus enforcement level to passive, helping avoid system instability.
95-
- Both the binary and Python versions of Client Analyzer are now included in the local package. There is no longer a need to download it separately, as it comes bundled by default. You can find it at the location `/opt/microsoft/mdatp/conf/client_analyzer/`.
9695
- Other stability enhancements and bug fixes.
9796

9897
### July-2025 Build: 101.25052.0007 | Release version: 30.125052.0007.0

defender-endpoint/microsoft-defender-passive-mode.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@ Some of the key benefits of Defender Antivirus in passive mode are:
2626

2727
* **EDR Block mode** - Post-breach protection by detecting and remediating threats missed by the active antimalware solution
2828

29-
* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded.
30-
3129
* **Security intelligence updates** - Microsoft Defender Antivirus continues to receive updates to stay aware of the latest threats.
3230

3331
* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded.

defender-endpoint/respond-machine-alerts.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -103,19 +103,19 @@ Or, use this alternate procedure:
103103

104104
![Image of collect investigation package](media/collect-investigation-package.png)
105105

106-
2. Add comments and then select **Confirm**.
106+
1. Add comments and then select **Confirm**.
107107

108108
![Image of confirm comment](media/comments-confirm.png)
109109

110-
3. Select **Action center** from the response actions section of the device page.
110+
1. Select **Action center** from the response actions section of the device page.
111111

112112
![Image of action center](media/action-center-selected.png)
113113

114-
4. Select **Package collection package available** to download the collection package.
114+
1. Select **Package collection package available** to download the collection package.
115115

116116
![Image of download package](media/download-package.png)
117-
118-
> [!NOTE]
117+
118+
> [!NOTE]
119119
> The collection of the investigation package may fail if a device has a low battery level or is on a metered connection.
120120
121121
### Investigation package contents for Windows devices
@@ -216,7 +216,8 @@ Depending on the severity of the attack and the sensitivity of the device, you m
216216
- You can use the device isolation capability on all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](mde-linux-prerequisites.md). Ensure that the following prerequisites are enabled:
217217
- `iptables`
218218
- `ip6tables`
219-
- Linux kernel with `CONFIG_NETFILTER`, `CONFID_IP_NF_IPTABLES`, and `CONFIG_IP_NF_MATCH_OWNER`
219+
- Linux kernel with `CONFIG_NETFILTER`, `CONFIG_IP_NF_IPTABLES`, and `CONFIG_IP_NF_MATCH_OWNER` for kernel version lower than 5.x and `CONFIG_NETFILTER_XT_MATCH_OWNER` from 5.x kernel.
220+
220221
- Selective isolation is available for devices running on Windows 11, Windows 10 version 1703 or later, Windows Server 2012 R2 and later, Azure Stack HCI OS, version 23H2 and later, and macOS. For more information about selective isolation, see [Isolation exclusions](./isolation-exclusions.md).
221222
- When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
222223
- The feature supports VPN connection.

defender-office-365/mdo-email-entity-page.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -476,6 +476,8 @@ The following actions are available at the top of the Email entity page:
476476

477477
> [!TIP]
478478
> **Download email** isn't available for messages that were quarantined. Instead, [download a password protected copy of the message from quarantine](quarantine-admin-manage-messages-files.md#download-email-from-quarantine).
479+
>
480+
> **Email preview** and **Download email** actions are available in **Audit Logs** and **CloudAppEvents** table of Advanced Hunting (Record type 38) for auditing and reporting.
479481
480482
¹ The **Email preview** and **Download email** actions require the **Preview** role. You can assign this role in the following locations:
481483

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ The following tables present the relevant vulnerability information organized by
3939
|---|---|---|
4040
| - | Added MDVM support for Zoom vulnerability- CVE-2025-49457 | 03-September-25 |
4141
| - | Added MDVM support for 8 Tableau Server vulnerabilities- CVE-2025-52446, CVE-2025-52447, CVE-2025-52448, CVE-2025-52449, CVE-2025-52452, CVE-2025-52453, CVE-2025-52454 and CVE-2025-52455 | 09-September-25 |
42+
| - | Defender Vulnerability Management has completely rolled back support for Microsoft Visual C++ | 18-September-25 |
4243

4344
## August 2025
4445

@@ -52,7 +53,6 @@ The following tables present the relevant vulnerability information organized by
5253
| 103856 | Fixed bad normalization in McAfee Network Security Manager | 05-August-25 |
5354
| 109441 | Fixed bad normalization in AlmaLinux Perl | 05-August-25 |
5455
| 97670 | Fixed inaccurate detections of VMware Tools by excluding invalid paths - "/vmware blast/", "/remote experience/" | 19-August-25 |
55-
| - | Added MDVM support for Microsoft Visual C++ vulnerabilities- CVE-2009-0901, CVE-2009-2493, CVE-2010-3190, CVE-2024-43590 | 20-August-25 |
5656
| 112007 | Fixed inaccuracy in Gimp vulnerability- CVE-2025-8672 | 21-August-25 |
5757
| 109858 | Fixed inaccuracy in Microsoft SQL Server Management Studio vulnerability- CVE-2025-29803 | 21-August-25 |
5858
| - | Updated CPE detection logic for Cisco Identity Services Engine | 26-August-25 |

0 commit comments

Comments
 (0)